aboutsummaryrefslogtreecommitdiff
path: root/kernel
diff options
context:
space:
mode:
authorEric Dumazet <eric.dumazet@gmail.com>2011-06-17 16:25:39 -0400
committerGreg Kroah-Hartman <gregkh@suse.de>2011-07-13 05:31:26 +0200
commitec15d0b0d6d43e8f9daf6282c7f22dacf5e2f089 (patch)
treead090d2fa1efc39b8a1558f11cb08fb06893e672 /kernel
parent29ee67cbbaac453bea60fcf843e91b9cb3f49874 (diff)
inet_diag: fix inet_diag_bc_audit()
[ Upstream commit eeb1497277d6b1a0a34ed36b97e18f2bd7d6de0d ] A malicious user or buggy application can inject code and trigger an infinite loop in inet_diag_bc_audit() Also make sure each instruction is aligned on 4 bytes boundary, to avoid unaligned accesses. Reported-by: Dan Rosenberg <drosenberg@vsecurity.com> Signed-off-by: Eric Dumazet <eric.dumazet@gmail.com> Signed-off-by: David S. Miller <davem@davemloft.net> Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
Diffstat (limited to 'kernel')
0 files changed, 0 insertions, 0 deletions